A payment system that uses replacement account identifiers is disclosed. An encrypted primary account number (PAN) may be received by a secure computer from a data entry device. The encrypted PAN may be decrypted by the secure computer and the secure computer may transmit a zero, nominal or no dollar authorization request to an issuer. Using the zero, nominal or no dollar authorization request, the issuer may verify the account. If the account is verified, then a replacement account identifier can be issued at a later time. The replacement account identifier may be used instead of the actual PAN to conduct payment transactions.

Patent
   10096009
Priority
Jan 20 2015
Filed
Jan 20 2015
Issued
Oct 09 2018
Expiry
Jun 26 2036
Extension
523 days
Assg.orig
Entity
Large
7
540
currently ok
1. A method comprising:
receiving, by a management computer, an authorization identifier, wherein the authorization identifier is generated by an authorization computer after the authorization computer receives a first authorization request message comprising an original account identifier and a zero, nominal or no dollar amount, wherein the authorization identifier is provided in a first authorization response message;
generating, by the management computer, a replacement account identifier request message;
transmitting, by the management computer, the replacement account identifier request message to a payment processing computer, the replacement account identifier request message includes the authorization identifier;
receiving, by the management computer, in response to transmitting the replacement account identifier request message including the authorization identifier, a replacement account identifier response message comprising a replacement account identifier;
generating, by the management computer, a second authorization request message comprising a transaction amount and the replacement account identifier to the payment processing computer to authorize a transaction; and
receiving, by the management computer, a second authorization response message authorizing or declining the transaction, the second authorization response message including the replacement account identifier.
8. A management computer comprising:
a processor; and
a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor to implement a method comprising
receiving an authorization identifier, wherein the authorization identifier is generated by an authorization computer after the authorization computer receives a first authorization request message comprising an original account identifier and a zero, nominal or no dollar amount, wherein the authorization identifier is provided in a first authorization response message;
generating a replacement account identifier request message;
transmitting the replacement account identifier request message to a payment processing computer, the replacement account identifier request message includes the authorization identifier;
receiving, in response to transmitting the replacement account identifier request message including the authorization identifier, a replacement account identifier response message comprising a replacement account identifier;
generating, by the management computer, a second authorization request message comprising a transaction amount and the replacement account identifier to the payment processing computer to authorize a transaction; and
receiving, by the management computer, a second authorization response message authorizing or declining the transaction, the second authorization response message including the replacement account identifier.
10. A system comprising:
a local workstation; and
a management computer in communication with the local workstation, the management computer comprising a processor, and a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor to implement a method comprising
receiving an authorization identifier from the local workstation, wherein the authorization identifier is generated by an authorization computer after the authorization computer receives an authorization request message comprising an original account identifier and a zero, nominal or no dollar amount, wherein the authorization identifier is provided in a first authorization response message;
generating a replacement account identifier request message;
transmitting the replacement account identifier request message to a payment processing computer, the replacement account identifier request message includes the authorization identifier;
receiving in response to transmitting the replacement account identifier request message including the authorization identifier, a replacement account identifier response message comprising a replacement account identifier;
generating, by the management computer, a second authorization request message comprising a transaction amount and the replacement account identifier to the payment processing computer to authorize a transaction; and
receiving, by the management computer, a second authorization response message authorizing or declining the transaction, the second authorization response message including the replacement account identifier.
2. The method of claim 1 wherein authorization identifier is received from a local workstation, along with order information for a transaction.
3. The method of claim 2 further comprising:
receiving, by the local workstation, the original account identifier from a keyboard device.
4. The method of claim 3 wherein the original account identifier is an encrypted original account identifier and wherein the first authorization request message comprises the encrypted original account identifier.
5. The method of claim 1 wherein the authorization computer is an issuer computer.
6. The method of claim 1
wherein the payment processing computer modifies the second authorization request message to exclude the replacement account identifier and to include the original account identifier, sends the second authorization request message with the original account identifier to the authorization computer and receives the second authorization response message from the authorization computer comprising the original account identifier, modifies the second authorization response message to include the replacement account identifier and transmits the second authorization response message with the replacement account identifier to the management computer.
7. The method of claim 6 wherein the transaction is a recurring payment transaction.
9. The management computer of claim 8
wherein the payment processing computer modifies the second authorization request message to exclude the replacement account identifier and to include the original account identifier, sends the second authorization request message with the original account identifier to the authorization computer and receives the second authorization response message from the authorization computer comprising the original account identifier, modifies the second authorization response message to include the replacement account identifier and transmits the second authorization response message with the replacement account identifier to the management computer.
11. The system of claim 10, wherein the processor is a first processor and the computer readable medium is a first computer readable medium, and wherein the system further comprises:
a data entry device in communication with the local workstation, wherein the data entry device comprises a second processor and a second computer readable medium, the second computer readable medium comprising code, executable by the second processor, for encrypting the original account identifier.
12. The system of claim 11 wherein the data entry device is a keypad device.
13. The system of claim 11 further comprising the authorization computer.

None.

Conventional systems and methods for generating replacement account numbers generally include sending an original account number from a requestor computer to a central host computer. The central host computer can then provide the replacement account number to the requester computer. The requestor computer can then use that replacement account number in a payment transaction instead of the original account number.

Systems and methods that use replacement account numbers instead of original account numbers are outside the scope of PCI (payment card industry) requirements, because the original account numbers are not at risk of being obtained by unauthorized persons. Since the methods and systems are outside the scope of PCI requirements, the methods and systems need not implement the stringent security protocols required by PCI.

While conventional systems and methods that use replacement account numbers are useful, a number of improvements can be made. For example, one problem with issuing replacement account numbers is that they can sometimes be issued even though the accounts associated with the account numbers used in the replacement account number requests may not be in good standing. This can impose a significant risk to various entities (e.g., issuers) who manage the accounts, or who might otherwise use the accounts to conduct payment transactions.

Embodiments of the invention address this and other problems, individually and collectively.

Embodiments of the present invention relate to systems and methods for providing better data and transaction security when processing payment transactions.

One embodiment of the invention is directed to a method. The method includes receiving, by a management computer, an authorization identifier. The authorization identifier is generated by an authorization computer after the authorization computer receives an authorization request message comprising an original account identifier (e.g., a PAN or primary account number) and a zero, nominal, or no dollar amount. The method also includes generating a replacement account identifier request message and sending the replacement account identifier request message to a payment processing computer. The method also includes receiving, by the management computer, in response to transmitting the replacement account identifier request message, a replacement account identifier response message comprising the replacement account identifier. The replacement account identifier can then be used to conduct payment transactions instead of the original account identifier.

Another embodiment of the invention is directed to a management computer comprising a processor and a computer readable medium coupled to the processor. The computer readable medium comprises code, executable by the processor to implement a method. The method comprises receiving an authorization identifier. The authorization identifier is generated by an authorization computer after the authorization computer receives an authorization request message comprising an original account identifier and a zero, nominal or no dollar amount. The method also includes generating a replacement account identifier request message, and transmitting the replacement account identifier request message to a payment processing computer. The method further comprises receiving, in response to transmitting the replacement account identifier request message, a replacement account identifier response message comprising the replacement account identifier. The replacement account identifier may thereafter be used to conduct payment transactions instead of the original account identifier.

Another embodiment of the invention is directed to a system comprising a local workstation and a management computer in communication with the local workstation. The management computer comprises a processor and a computer readable medium coupled to the processor. The computer readable medium comprises code, executable by the processor to implement a method. The method includes receiving an authorization identifier from the workstation. The authorization identifier is generated by an authorization computer after the authorization computer receives an authorization request message comprising an original account identifier and a zero, nominal or no dollar amount. The method also includes generating a replacement account identifier request message, transmitting the replacement account identifier request message to a payment processing computer, and receiving, in response to transmitting the replacement account identifier request message, a replacement account identifier response message comprising the replacement account identifier. The replacement account identifier may be used instead of the original account identifier to conduct transactions.

These and other embodiments of the invention are described in further detail below.

FIG. 1 shows a block diagram of a system according to an embodiment of the invention.

FIG. 2A is a block diagram showing components of a data entry device according to an embodiment of the invention.

FIG. 2B is a block diagram showing components of a workstation according to an embodiment of the invention.

FIG. 2C is a block diagram showing components of an order management computer according to an embodiment of the invention.

FIG. 2D is a block diagram showing components of a payment processing computer according to an embodiment of the invention.

FIG. 3 is a flowchart illustrating methods according to embodiments of the invention.

FIG. 4 is a block diagram of a computer apparatus.

One embodiment of the invention is directed to a method that includes receiving, by a workstation and from a data entry device in a merchant system, an encrypted payment account identifier. Prior to receipt by the workstation, the encrypted payment account identifier was formed by encrypting an original account identifier at the data entry device.

The workstation may generate an authorization request message comprising an original account identifier and a zero, nominal or no dollar amount, and may transmit it to a payment processing computer. A “zero” dollar authorization request message is an authorization request message that has a zero in the amount data field. An authorization request message with a “no dollar” amount means that there is no dollar value in the amount data field in the authorization request message. A “nominal” dollar amount can relate to an amount that is not indicative of a normal transaction in the environment in which transactions are normally conducted by the merchant system. As such, the nominal dollar amount cannot be mistaken for a real transaction amount that might be processed by the merchant system. For example, if a cable TV provider sends always sends transaction amounts greater than $10, then any amount less than this may be a nominal dollar amount. Typically, a nominal dollar amount might be $1 or $0.01 (or any suitable value less than $2 or $1).

The authorization request message comprising the encrypted payment account identifier may then be transmitted to a payment processing computer. The payment processing computer then decrypts the encrypted payment account identifier to obtain the original unencrypted payment account identifier. After the payment processing computer obtains the unencrypted payment account identifier, it may generate an authorization request message comprising an original account identifier and the zero, nominal or no dollar amount.

In some embodiments, the payment processing computer may then transmit the authorization request message to an issuer computer via an acquirer computer and a payment processing network. The issuer computer may verify that the account exists and is otherwise in good standing. Once the account has been verified by the issuer computer, the issuer computer may transmit an authorization response message comprising an authorization identifier to the payment processing computer. The authorization identifier may then be provided to the workstation, and the workstation may provide it to an order management computer.

After the order management computer receives the authorization identifier, it may generate a replacement account identifier request message and transmit it to the payment processing computer. The payment processing computer may determine a replacement account identifier in response to receiving the authorization identifier. Once it is determined, the payment processing computer may then transmit it to the order management computer. The order management computer may then receive a replacement account identifier response message comprising a replacement account identifier for the original account identifier.

The replacement account identifier may be stored at the order management computer to conduct recurring or non-recurring payment transactions. For example, in some embodiments, the order management computer may periodically send requests including the replacement account identifiers and transaction amounts to the payment processing computer to obtain authorizations for the recurring transactions.

In a specific transaction, the payment processing computer may receive an authorization request message comprising the replacement account identifier and a transaction amount from the order management computer. It may then generate a modified authorization request message including the original account identifier and the transaction amount. It may then transmit it to the issuer computer via an acquirer computer and a payment processing network. The issuer may then respond to the authorization request message by transmitting an authorization response message back to the payment processing computer via the payment processing network and the acquirer computer.

At the end of the day or at some other suitable period of time, a clearing and settlement process between the payment processing network, the acquirer computer, and the issuer computer may take place.

As noted above, in embodiments of the invention, the original account identifier is not maintained by the order management computer. The original account identifier only passes through an original data entry device and local workstation one time, in an encrypted format. Only the replacement account identifier is used thereafter. Further, before the replacement account identifier is actually used for purchasing, the account associated with the original account identifier is verified. The verification of the status of the account can advantageously be obtained using a traditional credit and debit card payments infrastructure, before any replacement account identifiers are issued and used for payment transactions.

Before discussing specific embodiments of the invention, some terms may be discussed in further detail.

“Payment account information” may be any information that identifies or is associated with a payment account. Payment account information may be provided in order to make a payment from a payment account. Some examples of payment account information include one or more of a PAN (primary account number), a CVV (card verification value), a dCVV (dynamic card verification value), a user name, an expiration date, a gift card number or code, etc.

An “original account identifier” may include a transactable identifier associated with a payment account that directly represents the payment account. For example, an original account identifier may be a primary account number (PAN) issued by an issuer for a card account (e.g., credit card, debit card, etc.). For instance, in some embodiments, an original account identifier may include a sixteen digit numerical value such as “4147 0900 0000 1234.” The first six digits of the real account identifier (e.g., “414709”), may represent a real issuer identifier (e.g., a “BIN” or bank identification number) that may identify an issuer associated with the real account identifier.

A “replacement account identifier” may include an identifier for a payment account that is a substitute for an account identifier, such as an original account identifier or a primary account number (PAN). The replacement account identifier may have the same or different format as the primary account number. In some embodiments, the replacement account identifier may be a subscription ID, when the replacement account identifier is to be used for recurring payment transactions (as in the case of a subscription that utilizes a recurring payment authorization to maintain the subscription). In other embodiments, the replacement account identifier may include a series of alphanumeric characters that may be used as a substitute for an original account identifier. For example, a replacement account identifier “4900 0000 0000 0001” may be used in place of a PAN “4147 0900 0000 1234.” In some embodiments, a replacement account identifier may be “format preserving” and may have a numeric format that conforms to the account identifiers used in existing payment processing networks (e.g., ISO 8583 financial transaction message format). In some embodiments, a replacement account identifier may be used in place of a PAN to initiate, authorize, settle or resolve a payment transaction or represent the original credential in other systems where the original credential would typically be provided. In some embodiments, a replacement account identifier value may be generated such that the recovery of the original PAN or other account identifier from the replacement account identifier value may not be computationally derived. Further, in some embodiments, the replacement account identifier format may be configured to allow the entity receiving the replacement account identifier to identify it as a replacement account identifier and recognize the entity that issued the replacement account identifier.

An “authorization request message” may be an electronic message that is sent to request authorization for a transaction. The authorization request message can be sent to a payment processing network and/or an issuer of a payment card. An authorization request message according to some embodiments may comply with ISO 8583, which is a standard for systems that exchange electronic transaction information associated with a payment made by a user using a payment device or payment account. The authorization request message may include information that can be used to identify an account. An authorization request message may also comprise additional data elements such as one or more of a service code, an expiration date, etc. An authorization request message may also comprise transaction information, such as any information associated with a current transaction, such as the transaction amount, merchant identifier, merchant location, etc., as well as any other information that may be utilized in determining whether to identify and/or authorize a transaction. The authorization request message may also include other information such as information that identifies the access device (or other computer) that generated the authorization request message, information about the location of the access device, etc.

An “authorization response message” may be an electronic message reply to an authorization request message. The authorization response message can be generated by an issuing financial institution or a payment processing network. The authorization response message may include, by way of example only, one or more of the following status indicators: Approval—transaction was approved; Decline—transaction was not approved; or Call Center—response pending more information, merchant must call the toll-free authorization phone number. The authorization response message may also include an authorization code, which may be a code that a credit card issuing bank returns in response to an authorization request message in an electronic message (either directly or through the payment processing network) to the merchant computer that indicates approval of the transaction. The code may serve as proof of authorization. As noted above, in some embodiments, a payment processing network may generate or forward the authorization response message to the merchant.

A “key” may refer to a piece of information that is used in a cryptographic algorithm to transform input data into another representation. A cryptographic algorithm can be an encryption algorithm that transforms original data into an alternate representation, or a decryption algorithm that transforms encrypted information back to the original data. Examples of cryptographic algorithms may include triple data encryption standard (TDES), data encryption standard (DES), advanced encryption standard (AES), etc.

An “issuer” may typically refer to a business entity (e.g., a bank) that maintains an account for a user that is associated with a portable communication device such as an account enrolled in a mobile application installed on a portable communication device. An issuer may also issue account parameters associated with the account to a portable communication device. An issuer may be associated with a host system that performs some or all of the functions of the issuer on behalf of the issuer.

An “authorization computer” may include any suitable computer that can perform authorization processing. For example, an issuer computer is an example of an authorization computer. The issuer computer may authorize transactions by analyzing data in authorization request messages.

A “merchant” may typically be an entity that engages in transactions and can sell goods or services, or provide access to goods or services.

An “acquirer” may typically be a business entity (e.g., a commercial bank) that has a business relationship with a particular merchant or other entity. Some entities can perform both issuer and acquirer functions. Some embodiments may encompass such single entity issuer-acquirers.

A “server computer” may typically be a powerful computer or cluster of computers. For example, the server computer can be a large mainframe, a minicomputer cluster, or a group of servers functioning as a unit. The server computer may be associated with an entity such as a payment processing network, a wallet provider, a merchant, an authentication cloud, an acquirer or an issuer.

FIG. 1 shows a system according to an embodiment of the invention. The system may include a merchant system which may include client computer 20 and a data entry device 10 coupled to the client computer 20. The client computer 20 and the data entry device 10 may be used by a user (e.g., a call center employee) at a merchant. In some embodiments, the data entry device 10 may be a keyboard. It may comprise encryption software so that sensitive data such as original account identifier information can be encrypted. The merchant system may also comprise a local workstation 30 and an order management computer 40 in communication with the client computer 20. The local workstation 30 may service a number of different client computers, and the order management computer 40 may service one or more local workstations. Although in some embodiments of the invention, the data entry device 10, the client computer 20, the local workstation 30, and the client computer 40 are in or part of a merchant system, they may be part of other systems in other embodiments of the invention.

The system in FIG. 1 may also have a payment processing computer 50 which may be coupled to the local workstation 30 and the order management computer 40. In some embodiments, the payment processing computer 50 may receive authorization requests and provide responses to the local workstation 30 and the order management computer 40. In some embodiments, the local workstation 30 may be part of the order management computer 40. The payment processing computer 50 may also include or operate a database which may correlate replacement account identifier data with original account identifier data.

In addition to being in communication with the local workstation 30 and the order management computer 40, the payment processing computer 50 may also be in communication with an issuer computer 80 via an acquirer computer 60 and a payment processing network 70. The payment processing computer 50 may be part of a secure transaction system, which may or may not include the issuer computer 80, the acquirer computer 60 and the payment processing network 70. Transmission and storage of original account identifiers may be secure in the payment processing computer 50, the issuer computer 80, the acquirer computer 60 and/or the payment processing network 70

The payment processing network 70 may include data processing subsystems, networks, and operations used to support and deliver authorization services, exception file services, transaction scoring services, and clearing and settlement services. An exemplary payment processing network may include VisaNet™. Payment processing networks such as VisaNet™ are able to process credit card transactions, debit card transactions, and other types of commercial transactions. VisaNet™, in particular, may include a VIP system (Visa Integrated Payments system) which processes authorization requests and a Base II system which performs clearing and settlement services.

Any suitable number or types of communication networks may be present between the computers and devices shown in FIG. 1. A communications network may be any one and/or the combination of the following: a direct interconnection; the Internet; a Local Area Network (LAN); a Metropolitan Area Network (MAN); an Operating Missions as Nodes on the Internet (OMNI); a secured custom connection; a Wide Area Network (WAN); a wireless network (e.g., employing protocols such as, but not limited to a Wireless Application Protocol (WAP), I-mode, and/or the like); and/or the like.

FIG. 2A is a block diagram showing components of a data entry device 10 according to an embodiment of the invention. The data entry device 10 comprises a data processor 10A, a computer readable medium 10B, an I/O interface 10C, and a user interface 10D (e.g., a keyboard, a touchscreen, microphone, etc.) coupled to the data processor 10A. The computer readable medium 10B comprises an encryption module 10B-1 and encryption keys 10B-2.

Computer readable media can include both volatile and nonvolatile media, both removable and non-removable media, and both local and remote media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile discs (DVD) or other optical disc storage, magnetic cassettes, magnetic tape, magnetic disc storage or other magnetic storage devices, or any other medium.

The encryption module 10B-1 may comprise code, executable by the data processor 10A, to encrypt data such as primary account numbers. It may include code for performing any suitable and known encryption process including DES, triple DES, AES, etc.

FIG. 2B is a block diagram showing components of a workstation 30 according to an embodiment of the invention. The workstation 30 comprises a data processor 30A, a computer readable medium 30B, a memory 30C, and an I/O interface 30D coupled to the data processor 30A. The computer readable medium 30B comprises an authorization processing module 30B-1. The authorization processing module 30B-1 may have code, executable by the data processor 30A to perform authorization processing. Authorization processing may include the generation, transmission, and/or receipt of payment transaction authorization request and response messages.

FIG. 2C is a block diagram showing components of an order management computer 40 according to an embodiment of the invention. The order management computer 40 comprises a data processor 40A, a computer readable medium 40B, a memory 40C, and an I/O interface 40D coupled to the data processor 40A. The computer readable medium 40B comprises a replacement account identifier creation request module 40B-1, an authorization processing module 40B-2, and an order tracking module 40B-3. The order management computer 40 is an example of a management computer, where the management computer may manage any suitable type of data and may perform any or all of the functions of the order management computer 40B-2, as well as additional functions.

The replacement account identifier creation request module 40B-1 may comprise code, executable by the data processor 40A to create a replacement account identifier request message. The replacement account identifier request message may request a replacement account identifier such as a subscription ID.

The replacement account identifier may be requested or provided to another computer using any suitable form of communication. In some embodiments, a replacement account identifier request may be in an electronic message format, such as an e-mail, a short messaging service (SMS) message, a multimedia messaging service (MMS) message, a hypertext transfer protocol (HTTP) request message, a transmission control protocol (TCP) packet, a web form submission. The replacement account identifier may be directed to any suitable location, such as an e-mail address, a telephone number, an internet protocol (IP) address, or a uniform resource locator (URL). In some embodiments, the replacement account identifier request may comprise a mix of different message types, such as both email and SMS messages.

The authorization processing module 40B-2 may comprise code, executable by the data processor 40A to perform authorization processing. Authorization processing may include the generation, transmission, and/or receipt of payment transaction authorization request and response messages.

The order tracking module 40B-3 may comprise code, executable by the data processor 40A, to track and manage orders associated with a particular account, subscription ID, or individual.

FIG. 2D is a block diagram showing components of a payment processing computer 50 according to an embodiment of the invention. The payment processing computer 50 comprises a data processor 50A, a computer readable medium 50B, a memory 50C, and an I/O interface 50D coupled to the data processor 50A. The computer readable medium 50B comprises an authorization processing module 50B-1, a replacement account identifier generation module 50B-2, a replacement account identifier database 50B-3, an encryption module 50B-4, and encryption keys 50B-5.

The authorization processing module 50B-1 may include code that is similar to the code in the previously described authorization processing modules 30B-1, 40B-1.

The replacement account identifier generation module 50B-1 may include code, executable by the data processor 50A, that can generate replacement account identifiers. Replacement account identifiers may be generated using an algorithm that converts real PANs into replacement account identifiers. In another example, a listing of replacement account identifiers may be generated in advance and they may be associated with actual PANs over time. In the latter case, the replacement account identifier may be generated in batch, rather than on a per account basis.

The replacement account identifier database 50B-3 may store data tables that map the replacement account identifiers to the PANs. The database 50B-3 may be a conventional, fault tolerant, relational, scalable, secure database such as Oracle™ or Sybase™.

The encryption/decryption module 50B-4 may comprise code, executable by the data processor 50A to encrypt or decrypt data. It may comprise code for performing any suitable encryption and/or decryption process using DES, triple DES, AES, or any other suitable encryption algorithm. In embodiments of the invention, the encryption/decryption module may comprise code for decrypting an encrypted PAN that is received from a merchant's data entry device.

FIG. 3 is a flowchart illustrating methods according to embodiments of the invention. Methods according to embodiments of the invention may be described with reference to FIGS. 1-3. The methods described below relate to the entry of data into a data entry device by a merchant employee such as a call center employee. However, embodiments of the invention are not limited to the specifically described embodiments. For example, embodiments of the invention can be utilized without the use of a call center. In addition, although the use of a recurring payment is described in detail, embodiments of the invention are not limited to recurring payment transactions. Lastly, although the methods described below include steps that are described in a particular order, it is understood that the steps may occur in other sequences and may still be within embodiments of the invention.

In an embodiment of the invention, a consumer may contact a user operating the client computer 20 and the data entry device 10. For example, the user may be a call center employee acting on behalf of a merchant. The consumer can call the user to place an order for a good or service offered by the merchant. During the call, the consumer may provide the user with their credit card number and the expiration date associated with the credit card number (or any other suitable combination of payment credentials or account information). After the user receives this information, the user may then key in this information into the data entry device 10. In some embodiments, the data entry device 10 may be a keypad and the client computer 20 can be a desktop computer coupled to the keypad.

In step S100, after an original account identifier (e.g., a PAN) and the expiration date are keyed into the user interface 10D (e.g., keys) of the data entry device 100 (e.g., a keyboard) by the user, they are encrypted by the data entry device 100. The encryption module 10B-1 stored on the computer readable medium 10B may comprise encryption software that uses an encryption algorithm and one or more stored encryption keys 10B-2 to encrypt the original account identifier and the expiration date to form an encrypted payload.

In steps S110 and S120, the encrypted payload containing the encrypted original account identifier and the encrypted expiration date are sent to the local workstation 30 via the user's client computer 20.

In step S130, the local workstation 30 receives the encrypted payload. The local workstation 30 then uses the authorization processing module 30B-1 and the data processor 30A to generate a first authorization request message comprising the encrypted payload and a zero, nominal or no dollar transaction amount. The local workstation 30 then sends the zero, nominal or one dollar first authorization request message to the payment processing computer 60.

The zero, nominal or no dollar first authorization request message may include any suitable information. For example, it may include one or more of: (a) the encrypted payload received from the data entry device 10 (e.g., the encrypted card number and expiration date), (b) a merchant reference number, (c) a “bill to” name and address (these can be set to dummy values), (d) a device type or identifier for the device that captured the payment account information, (e) an indication of the encryption algorithm used to encrypt the payment account information, (f) an indication of any other encoding methods used, (g) an indication of the entry mode (keyed vs. swipe) used to obtain the account information, (h) an indication of the capabilities of the data entry device 10, and (i) a card present indicator (yes or no).

After the payment processing computer 60 receives the zero, nominal or no dollar authorization request message, the payment processing computer 60 decrypts the encrypted original account identifier and modifies the zero, nominal or no dollar authorization request message so that it excludes the encrypted original account identifier and includes the unencrypted original account identifier. The encryption module 50B-4 and one or more encryption keys 50B-5 may be used for this purpose. The modified zero, nominal or no dollar first authorization request message is then sent to the issuer computer 80 via the acquirer computer 60 and the payment processing network 70.

The issuer computer 80 may then verify that the account associated with the original account number is in good standing. This can occur using any suitable process. Examples of processes include AVS (account verification service) checks, fraud checks, etc. The issuer computer 80 may include a data processor, and a computer readable medium coupled to the data processor. The computer readable medium may store any suitable number of software modules, including, but not limited to, a fraud processing module, an authorization module and an account verification module.

After the issuer computer 80 determines that the original account number is in good standing, it may then generate a first authorization response message with an authorization identifier. The first authorization response message may comprise the unencrypted original account identifier. The first authorization response message may be sent by the issuer computer 80 to payment processing computer 50 via the payment processing network 70 and the acquirer computer 60. It may include the real account identifier. The payment processing computer 50 may then modify the first authorization response message so that it excludes the unencrypted original account identifier includes the encrypted original account identifier and the authorization identifier.

In step S140, the local workstation 30 then receives the first authorization response message including the authorization identifier from the payment processing computer 50.

In step S150, the user, using the client computer 20, the local workstation 30, and optionally the data entry device 10, inputs the authorization identifier into an electronic form provided by the order management computer 40. The appropriate form may be provided on a display in the client computer 20 by the order management computer 40. The authorization identifier may be input into the electronic form using any suitable process including manual data entry, automatic form filling, or the cutting and pasting of data using a device such as a computer mouse.

In step S160, using the replacement account identifier request module 50B-2, the order management computer 40 generates and sends a subscription create request message including the authorization identifier to the payment processing computer 50.

After receiving the subscription create request message, the payment processing computer 50, using the replacement account identifier generation module 50B-2, generates the replacement account identifier in the form of a subscription identifier and transmits it to the order management computer 40. The subscription identifier may be any suitable set of characters that may identify a subscription that is associated with the consumer. In some embodiments, the subscription identifier may be an example of a replacement account identifier that can be used in place of the original account identifier (whether in an encrypted or unencrypted form).

In step S164, the subscription identifier is received by the order management computer 40.

In step S168, after receiving the subscription identifier, the order management computer 40 generates and sends a second authorization request message, for the full order amount, to the payment processing computer 50 with the subscription identifier.

In step S170, the payment processing computer 50 sends the second authorization request message to the issuer computer 80 via the acquirer computer 60 and the payment processing network 70. Prior to sending the second authorization request message to the issuer computer 80, the payment processing computer 50 may modify the second authorization request message by replacing (or excluding) the subscription identifier with the original account identifier. Once the second authorization request message is received by the issuer computer 80, the issuer computer 80 may analyze the second authorization request message to determine if the transaction should be authorized or not. After analyzing the second authorization request message, the issuer computer may generate a second authorization response message indicating whether or not the transaction is approved or declined.

In step 180, the second authorization response message that was sent by the issuer computer 80 is received at the payment processing computer 50. The payment processing computer 50 processes the authorization with the data stores in the subscription profile and returns the result to the local workstation 30 and the client computer 20.

Before or after the second authorization request message is transmitted to the issuer computer 80 by the payment processing computer 50, the previously received original account identifier and expiration date may be stored along with the subscription ID (or other replacement account identifier) in the replacement account identifier database 50B-3. The replacement account identifier database 50B-3 may thus contain links between unencrypted payment account information and replacement account identifiers. The placement account identifier database 50B-3 can serve as a replacement account identifier vault for processing future payment transactions using the replacement account identifiers.

At the end of the day or at some other suitable period of time, a clearing and settlement process occurs between the acquirer computer 60, the payment processing network 70, and the issuer computer 80.

The various participants and elements described herein with reference to FIG. 1 may operate one or more computer apparatuses to facilitate the functions described herein. Any of the elements in FIG. 1, including any servers or databases, may use any suitable number of subsystems to facilitate the functions described herein.

Examples of such subsystems or components are shown in FIG. 4. The subsystems shown in FIG. 4 are interconnected via a system bus 445. Additional subsystems such as a printer 444, keyboard 448, fixed disk 449 (or other memory comprising computer readable media), monitor 446, which is coupled to display adapter 482, and others are shown. Peripherals and input/output (I/O) devices, which couple to I/O controller 441 (which can be a processor or other suitable controller), can be connected to the computer system by any number of means known in the art, such as serial port 484. For example, serial port 484 or external interface 481 can be used to connect the computer apparatus to a wide area network such as the Internet, a mouse input device, or a scanner. The interconnection via system bus allows the central processor 443 to communicate with each subsystem and to control the execution of instructions from system memory 442 or the fixed disk 449, as well as the exchange of information between subsystems. The system memory 442 and/or the fixed disk 449 may embody a computer readable medium.

Any of the software components or functions described in this application, may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques. The software code may be stored as a series of instructions, or commands on a computer readable medium, such as a random access memory (RAM), a read only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.

Embodiments of the invention have a number of advantages. As noted above, in embodiments of the invention, the original account identifier (e.g., an unencrypted PAN) is encrypted at the point of entry to the merchant system and is not maintained or stored in the merchant system. Existing payment processing system channels can be used to verify the account before providing a replacement account identifier to the merchant system. Since the replacement account identifier is thereafter used for transaction processing, the merchant system can securely and efficiently process transactions while reducing the likelihood of future transaction declines by issuers. Systems according to embodiments of the invention can be considered outside the scope of PCI requirements.

The above description is illustrative and is not restrictive. Many variations of the invention will become apparent to those skilled in the art upon review of the disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the pending claims along with their full scope or equivalents.

One or more features from any embodiment may be combined with one or more features of any other embodiment without departing from the scope of the invention.

A recitation of “a”, “an” or “the” is intended to mean “one or more” unless specifically indicated to the contrary.

All patents, patent applications, publications, and descriptions mentioned above are herein incorporated by reference in their entirety for all purposes. None is admitted to be prior art.

McGuire, Keith

Patent Priority Assignee Title
10496965, Jan 20 2015 Visa International Service Association Secure payment processing using authorization request
10726416, Jun 25 2007 Visa International Service Association Secure mobile payment system
10853797, Sep 11 2012 Visa International Service Association Cloud-based virtual wallet NFC apparatuses, methods and systems
11010734, Jan 20 2015 Visa International Service Association Secure payment processing using authorization request
11676138, Aug 08 2013 Visa International Service Association Multi-network tokenization processing
11715097, Sep 11 2012 Visa International Service Association Cloud-based virtual wallet NFC apparatuses, methods and systems
11900343, Mar 03 2010 Visa International Service Association Portable account number for consumer payment account
Patent Priority Assignee Title
5613012, Nov 28 1994 Open Invention Network, LLC Tokenless identification system for authorization of electronic transactions and electronic transmissions
5781438, Dec 19 1995 Pitney Bowes Inc. Token generation process in an open metering system
5883810, Sep 24 1997 Microsoft Technology Licensing, LLC Electronic online commerce card with transactionproxy number for online transactions
5953710, Oct 09 1996 Children's credit or debit card system
5956699, Oct 03 1996 Jaesent Inc. System for secured credit card transactions on the internet
6000832, Sep 24 1997 Microsoft Technology Licensing, LLC Electronic online commerce card with customer generated transaction proxy number for online transactions
6014635, Dec 08 1997 SHC DIRECT, INC System and method for providing a discount credit transaction network
6044360, Apr 16 1996 RESTRICTED SPENDING SOLUTIONS, LLC Third party credit card
6163771, Aug 28 1997 PayPal, Inc Method and device for generating a single-use financial account number
6227447, May 10 1999 JPMORGAN CHASE BANK, N A Cardless payment system
6236981, Nov 20 1996 British Telecommunications public limited company Transaction system
6267292, Jun 13 1997 PayPal, Inc Method and apparatus for funds and credit line transfers
6327578, Dec 29 1998 PayPal, Inc Four-party credit/debit payment protocol
6341724, May 10 1999 JPMORGAN CHASE BANK, N A Cardless payment system
6385596, Feb 06 1998 Microsoft Technology Licensing, LLC Secure online music distribution system
6422462, Mar 30 1998 Apparatus and methods for improved credit cards and credit card transactions
6425523, Aug 17 1998 TUMBLEWEED HOLDINGS LLC Method for preventing unauthorized use of credit cards in remote payments and an optional supplemental-code card for use therein
6592044, May 15 2000 Privasys, Inc Anonymous electronic card for generating personal coupons useful in commercial and security transactions
6636833, Mar 25 1998 ORBIS PATENTS LTD Credit card system and method
6748367, Sep 24 1999 Method and system for effecting financial transactions over a public network without submission of sensitive information
6805287, Sep 12 2002 Liberty Peak Ventures, LLC System and method for converting a stored value card to a credit card
6879965, Mar 01 2000 SLINGSHOT TECHNOLOGIES LLC Method, system and computer readable medium for web site account and e-commerce management from a central location
6891953, Jun 27 2000 Microsoft Technology Licensing, LLC Method and system for binding enhanced software features to a persona
6901387, Dec 07 2001 Liberty Peak Ventures, LLC Electronic purchasing method and apparatus for performing the same
6931382, Jan 24 2001 Kioba Processing, LLC Payment instrument authorization technique
6938019, Aug 29 2000 AMPACASH CORPORATION Method and apparatus for making secure electronic payments
6941285, Apr 14 2000 Method and system for a virtual safe
6980670, Feb 09 1998 Open Invention Network, LLC Biometric tokenless electronic rewards system and method
6990470, Apr 11 2000 MasterCard International Incorporated Method and system for conducting secure payments over a computer network
6991157, Sep 12 2002 Liberty Peak Ventures, LLC System and method for re-associating an account number to another transaction account
7051929, Oct 18 2004 Secure credit card having daily changed security number
7069249, Jul 26 1999 iPrivacy, LLC Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party
7103576, Sep 21 2001 JPMORGAN CHASE BANK, N A System for providing cardless payment
7113930, Feb 23 2001 HEWLETT-PACKARD DEVELOPMENT COMPANY L P Conducting transactions
7136835, Mar 25 1998 ORBIS PATENTS LTD Credit card system and method
7177835, Aug 28 1997 PayPal, Inc Method and device for generating a single-use financial account number
7177848, Apr 11 2000 MasterCard International Incorporated Method and system for conducting secure payments over a computer network without a pseudo or proxy account number
7194437, May 14 1999 Amazon Technologies, Inc Computer-based funds transfer system
7209561, Jul 19 2002 Cybersource Corporation System and method for generating encryption seed values
7264154, Jul 12 2004 HARRIS INTELLECTUAL PROPERTY, LP System and method for securing a credit account
7287692, Jul 28 2004 Cisco Technology, Inc. System and method for securing transactions in a contact center environment
7292999, Mar 15 2001 Liberty Peak Ventures, LLC Online card present transaction
7350230, Dec 18 2002 CITIBANK, N A Wireless security module
7353382, Aug 08 2002 InterDigital Patent Holdings, Inc Security framework and protocol for universal pervasive transactions
7379919, Apr 11 2000 MasterCard International Incorporated Method and system for conducting secure payments over a computer network
7415443, Mar 15 2001 Liberty Peak Ventures, LLC Online card present transaction
7444676, Aug 29 2001 Direct authentication and authorization system and method for trusted network of financial institutions
7469151, Sep 01 2006 MasterCard International Incorporated Methods, systems and computer program products for over the air (OTA) provisioning of soft cards on devices with wireless communications capabilities
7548889, Jan 24 2005 Microsoft Technology Licensing, LLC Payment information security for multi-merchant purchasing environment for downloadable products
7567934, Mar 25 1998 ORBIS PATENTS, LTD Credit card system and method
7567936, Oct 14 2003 BENHOV GMBH, LLC Method and apparatus for handling pseudo identities
7571139, Feb 19 1999 EXXONMOBIL RESEARCH & ENGINEERING CO System and method for processing financial transactions
7571142, Jan 22 1999 ORBIS PATENTS LTD Credit card system and method
7580898, Mar 15 2004 Fitbit, Inc Financial transactions with dynamic personal account numbers
7584153, Mar 15 2004 Fitbit, Inc Financial transactions with dynamic card verification values
7593896, Mar 25 1998 Orbis Patents Ltd. Credit card system and method
7606560, Aug 08 2002 PCMS HOLDINGS, INC Authentication services using mobile device
7627531, Mar 07 2000 Liberty Peak Ventures, LLC System for facilitating a transaction
7627895, Mar 31 2004 British Telecommunications public limited company Trust tokens
7650314, May 25 2001 Liberty Peak Ventures, LLC System and method for securing a recurrent billing transaction
7685037, Mar 26 2001 3 M FUTURE LIMTIED Transaction authorisation system
7702578, Jun 14 2001 SLINGSHOT TECHNOLOGIES LLC Method, system and computer readable medium for web site account and e-commerce management from a central location
7707120, Apr 17 2002 Visa International Service Association Mobile account authentication service
7712655, Jan 20 2004 Banking computer account system with lock for secure payment via telephone
7734527, Aug 29 2000 AMPACASH CORPORATION Method and apparatus for making secure electronic payments
7753265, Jul 12 2004 HARRIS INTELLECTUAL PROPERTY, LP System and method for securing a credit account
7770789, May 17 2007 Shift4 Corporation Secure payment card transactions
7784685, Apr 26 2007 United Services Automobile Association (USAA); United Services Automobile Association Secure card
7793851, May 09 2005 DYNAMICS INC Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
7801826, Aug 08 2002 PCMS HOLDINGS, INC Framework and system for purchasing of goods and services
7805376, Jun 14 2002 Liberty Peak Ventures, LLC Methods and apparatus for facilitating a transaction
7805378, Jul 10 2001 Liberty Peak Ventures, LLC System and method for encoding information in magnetic stripe format for use in radio frequency identification transactions
7818264, Jun 19 2006 Visa U.S.A. Inc.; VISA U S A INC Track data encryption
7828220, May 09 2005 DYNAMICS INC Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
7835960, Mar 07 2000 Liberty Peak Ventures, LLC System for facilitating a transaction
7841523, May 17 2007 Shift4 Corporation Secure payment card transactions
7841539, Feb 15 2007 Smart card with random temporary account number generation
7844550, Aug 28 1997 PayPal, Inc Method and device for generating a single-use financial account number
7848980, Dec 26 2006 Visa U.S.A. Inc. Mobile payment system and method using alias
7849020, Apr 19 2005 Microsoft Technology Licensing, LLC Method and apparatus for network transactions
7853529, Aug 28 1997 PayPal, Inc Method and device for generating a single-use financial account number
7853995, Nov 18 2005 Microsoft Technology Licensing, LLC Short-lived certificate authority service
7865414, Mar 01 2000 SLINGSHOT TECHNOLOGIES LLC Method, system and computer readable medium for web site account and e-commerce management from a central location
7873579, Mar 15 2001 Liberty Peak Ventures, LLC Merchant facilitation of online card present transaction
7873580, Mar 15 2001 Liberty Peak Ventures, LLC Merchant system facilitating an online card present transaction
7890393, Feb 07 2002 PayPal, Inc Method and system for completing a transaction between a customer and a merchant
7891563, May 17 2007 Shift4 Corporation Secure payment card transactions
7896238, Apr 03 2007 XYLON, LLC Secured transaction using color coded account identifiers
7908216, Jul 22 1999 Visa International Service Association Internet payment, authentication and loading system using virtual smart card
7922082, Jan 04 2008 M2 INTERNATIONAL LTD Dynamic card validation value
7931195, May 09 2005 DYNAMICS INC Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
7937324, Sep 13 2007 Visa U.S.A. Inc. Account permanence
7938318, Apr 03 2007 Kioba Processing, LLC System and method for controlling secured transaction using directionally coded account identifiers
7954705, May 09 2005 DYNAMICS INC Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
7959076, Apr 26 2007 United Services Automobile Association (USAA); United Services Automobile Association Secure card
7996288, Nov 15 2000 iPrivacy, LLC Method and system for processing recurrent consumer transactions
8025223, Jun 10 2005 Liberty Peak Ventures, LLC System and method for mass transit merchant payment
8046256, Apr 14 2000 Liberty Peak Ventures, LLC System and method for using loyalty rewards as currency
8060448, May 30 2001 Late binding tokens
8060449, Jan 05 2009 T-MOBILE INNOVATIONS LLC Partially delegated over-the-air provisioning of a secure element
8074877, Dec 24 2007 Dynamics Inc. Systems and methods for programmable payment cards and devices with loyalty-based payment applications
8074879, Jul 12 2004 HARRIS INTELLECTUAL PROPERTY, LP System and method for securing a credit account
8082210, Apr 29 2003 The Western Union Company Authentication for online money transfers
8095113, Oct 17 2007 First Data Corporation Onetime passwords for smart chip cards
8104679, Dec 17 2003 Fitbit, Inc Display payment card with fraud and location detection
8109436, Apr 26 2007 United Services Automobile Association (USAA); United Services Automobile Association Secure card
8121942, Jun 25 2007 Visa U.S.A. Inc. Systems and methods for secure and transparent cardless transactions
8121956, Jun 25 2007 Visa U.S.A. Inc. Cardless challenge systems and methods
8126449, Nov 13 2008 Liberty Peak Ventures, LLC Servicing attributes on a mobile device
8171525, Sep 15 2011 GOOGLE LLC Enabling users to select between secure service providers using a central trusted service manager
8175973, Jul 22 1999 Visa International Service Association Internet payment, authentication and loading system using virtual smart card
8190523, Sep 13 2007 Visa U.S.A. Inc. Account permanence
8196813, Dec 03 2008 PayPal, Inc System and method to allow access to a value holding account
8205791, Oct 11 2005 National Payment Card Association Payment system and methods
8219489, Jul 29 2008 Visa U.S.A. Inc. Transaction processing using a global unique identifier
8224702, Dec 28 2007 PayPal, Inc Systems and methods for facilitating financial transactions over a network
8225385, Mar 23 2006 Microsoft Technology Licensing, LLC Multiple security token transactions
8229852, Jun 25 2007 Visa International Service Association Secure mobile payment system
8265993, Apr 14 2000 Liberty Peak Ventures, LLC System and method for using loyalty rewards as currency
8280777, Dec 28 2007 PayPal, Inc Systems and methods for facilitating financial transactions over a network
8281991, Aug 07 2008 VISA U S A INC Transaction secured in an untrusted environment
8328095, May 17 2007 Shift4 Corporation Secure payment card transactions
8336088, Apr 19 2010 Visa International Service Association Alias management and value transfer claim processing
8346666, Jan 19 2010 Visa International Service Association Token based transaction authentication
8376225, Apr 26 2007 United Services Automobile Association (USAA) Secure card
8380177, Apr 09 2010 PayPal, Inc Mobile phone payment processing methods and systems
8387873, Jun 10 2005 Liberty Peak Ventures, LLC System and method for mass transit merchant payment
8401539, Nov 13 2008 Liberty Peak Ventures, LLC Servicing attributes on a mobile device
8401898, Apr 14 2000 Liberty Peak Ventures, LLC System and method for using loyalty rewards as currency
8402555, Mar 21 2010 UNITED STATES DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE Personalized digital media access system (PDMAS)
8403211, Sep 04 2008 PATHWARD, NATIONAL ASSOCIATION System, program product and methods for retail activation and reload associated with partial authorization transactions
8412623, Jul 15 2002 CITICORP CREDIT SERVICES, INC USA Method and system for a multi-purpose transactional platform
8412837, Jul 08 2004 ROSKIND, JAMES A , DR Data privacy
8417642, Sep 14 2004 CORK GROUP TRADING LTD Online commercial transaction system and method of operation thereof
8433116, Nov 03 2009 STRATA SKIN SCIENCES, INC Showing skin lesion information
8447699, Oct 13 2009 Qualcomm Incorporated Global secure service provider directory
8453223, Sep 23 2011 Method, device and system for secure transactions
8453925, Mar 02 2006 VISA INTERNATIONAL SERVICE CORPORATION Method and system for performing two factor authentication in mail order and telephone order transactions
8458487, Mar 03 2010 OPEN TEXT HOLDINGS, INC System and methods for format preserving tokenization of sensitive information
8484134, Mar 15 2001 Liberty Peak Ventures, LLC Online card present transaction
8485437, Dec 24 2007 Dynamics Inc. Systems and methods for programmable payment cards and devices with loyalty-based payment applications
8494959, Aug 17 2007 EMC IP HOLDING COMPANY LLC Payment card with dynamic account number
8498908, Dec 28 2007 PayPal, Inc Systems and methods for facilitating financial transactions over a network
8504475, Aug 10 2009 Visa International Service Association Systems and methods for enrolling users in a payment service
8504478, Dec 21 2007 Liberty Peak Ventures, LLC Systems, methods and computer program products for performing mass transit merchant transactions
8510816, Feb 25 2010 SecureAuth Corporation Security device provisioning
8533860, Jan 11 2013 UNITED STATES DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE Personalized digital media access system—PDMAS part II
8538845, Jun 03 2011 FINTIV, INC Monetary transaction system
8555079, Dec 06 2011 WWPass Corporation Token management
8566168, Jan 05 2012 T-MOBILE INNOVATIONS LLC Electronic payment using a proxy account number stored in a secure element
8567670, Mar 27 2009 Aura Sub, LLC Dynamic card verification values and credit transactions
8571939, Jul 07 2010 Toshiba Global Commerce Solutions Holdings Corporation Two phase payment link and authorization for mobile devices
8577336, Nov 18 2010 COM INVESTMENTS, LLC System and method for transaction authentication using a mobile communication device
8577803, Jun 03 2011 Visa International Service Association Virtual wallet card selection apparatuses, methods and systems
8577813, Feb 21 2006 Universal Secure Registry, LLC Universal secure registry
8578176, Mar 26 2008 Protegrity Corporation Method and apparatus for tokenization of sensitive sets of characters
8583494, Nov 30 2007 BLAZE MOBILE, INC Processing payments at a management server with user selected payment method
8584251, Apr 07 2009 PRINCETON PAYMENT SOLUTIONS, LLC DELAWARE , WHOLLY-OWNED SUBSIDIARY OF FINANCIAL TRANSACTION SERVICES, LLC Token-based payment processing system
8589237, Nov 30 2007 BLAZE MOBILE, INC Online purchase from a mobile device using a default payment method
8589271, Feb 04 2002 ST ISIDORE RESEARCH, LLC System and method for verification, authentication, and notification of transactions
8589291, Jun 25 2007 Visa U.S.A. Inc. System and method utilizing device information
8595098, Mar 18 2009 NETWORK MERCHANTS, LLC Transmission of sensitive customer information during electronic-based transactions
8595812, Dec 18 2009 SABRE GLBL INC Tokenized data security
8595850, Jan 30 2012 MICRO FOCUS LLC System for protecting sensitive data with distributed tokenization
8606638, Mar 02 2009 First Data Corporation Systems, methods and apparatus for facilitating transactions using a mobile device
8606700, Jun 25 2007 VISA U.S.A., Inc. Systems and methods for secure and transparent cardless transactions
8606720, Nov 13 2011 GOOGLE LLC Secure storage of payment information on client devices
8615468, Jan 27 2010 CA, INC System and method for generating a dynamic card value
8620754, Nov 30 2007 BLAZE MOBILE, INC Remote transaction processing using authentication information
8635157, Jul 19 2010 PAYME, INC Mobile system and method for payments and non-financial transactions
8646059, Dec 17 2010 GOOGLE LLC Wallet application for interacting with a secure element application without a trusted server for authentication
8651374, Jun 02 2008 TRANSFORM SR BRANDS LLC System and method for payment card industry enterprise account number elimination
8656180, Dec 06 2011 WWPass Corporation Token activation
8751391, Mar 29 2002 JPMORGAN CHASE BANK, N A System and process for performing purchase transactions using tokens
8762263, Sep 06 2005 Visa U.S.A. Inc. System and method for secured account numbers in proximity devices
8793186, Sep 13 2007 Visa U.S.A. Inc. Account permanence
8838982, Sep 21 2011 Visa International Service Association Systems and methods to secure user identification
8856539, Mar 16 2001 Universal Secure Registry, LLC Universal secure registry
8887308, Mar 21 2010 UNITED STATES DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE Digital cloud access (PDMAS part III)
9065643, Jun 26 2007 VISA U S A INC System and method for account identifier obfuscation
9070129, Sep 04 2007 Visa U.S.A. Inc.; VISA U S A INC Method and system for securing data fields
9100826, Feb 21 2006 Universal Secure Registry, LLC Method and apparatus for secure access payment and identification
9160741, Apr 17 2007 Visa U.S.A. Inc. Remote authentication system
9229964, Oct 27 2011 Visa International Service Association Database cloning and migration for quality assurance
9245267, Mar 03 2010 Visa International Service Association Portable account number for consumer payment account
9249241, Mar 27 2013 UT-Battelle, LLC Surface-functionalized mesoporous carbon materials
9256871, Jul 26 2012 Visa U.S.A. Inc. Configurable payment tokens
9280765, Apr 11 2011 Visa International Service Association Multiple tokenization for authentication
9530137, Feb 21 2006 Universal Secure Registry, LLC Method and apparatus for secure access payment and identification
20010029485,
20010034720,
20010054003,
20020007320,
20020016749,
20020029193,
20020035548,
20020073045,
20020116341,
20020133467,
20020147913,
20030028481,
20030130955,
20030191709,
20030191945,
20040010462,
20040050928,
20040059682,
20040093281,
20040139008,
20040143532,
20040158532,
20040210449,
20040210498,
20040232225,
20040260646,
20050037735,
20050080730,
20050108178,
20050199709,
20050246293,
20050269401,
20050269402,
20060235795,
20060237528,
20060278704,
20070107044,
20070129955,
20070136193,
20070136211,
20070170247,
20070179885,
20070208671,
20070245414,
20070288377,
20070291995,
20080015988,
20080029607,
20080035738,
20080052226,
20080054068,
20080054079,
20080054081,
20080065554,
20080065555,
20080201264,
20080201265,
20080228646,
20080243702,
20080245855,
20080245861,
20080283591,
20080302869,
20080302876,
20080313264,
20090006262,
20090010488,
20090037333,
20090037388,
20090043702,
20090048971,
20090106112,
20090106160,
20090134217,
20090157555,
20090159673,
20090159700,
20090159707,
20090173782,
20090200371,
20090248583,
20090276347,
20090281948,
20090294527,
20090307139,
20090308921,
20090327131,
20100008535,
20100088237,
20100094755,
20100106644,
20100120408,
20100133334,
20100138347,
20100145860,
20100161433,
20100185545,
20100211505,
20100223186,
20100228668,
20100235284,
20100258620,
20100291904,
20100299267,
20100306076,
20100325041,
20110010292,
20110016047,
20110016320,
20110040640,
20110047076,
20110083018,
20110087596,
20110093397,
20110125597,
20110153437,
20110153498,
20110154466,
20110161233,
20110178926,
20110191244,
20110238511,
20110238573,
20110246317,
20110258111,
20110272471,
20110272478,
20110276380,
20110276381,
20110276424,
20110276425,
20110295745,
20110302081,
20120023567,
20120028609,
20120030047,
20120035998,
20120041881,
20120047237,
20120066078,
20120072350,
20120078735,
20120078798,
20120078799,
20120095852,
20120095865,
20120116902,
20120123882,
20120123940,
20120129514,
20120136796,
20120143767,
20120143772,
20120158580,
20120158593,
20120173431,
20120185386,
20120197807,
20120203664,
20120203666,
20120215688,
20120215696,
20120221421,
20120226582,
20120231844,
20120233004,
20120246070,
20120246071,
20120246079,
20120265631,
20120271770,
20120297446,
20120300932,
20120303503,
20120303961,
20120304273,
20120310725,
20120310831,
20120316992,
20120317035,
20120317036,
20130017784,
20130018757,
20130019098,
20130031006,
20130054337,
20130054466,
20130054474,
20130081122,
20130091028,
20130110658,
20130111599,
20130117185,
20130124290,
20130124291,
20130124364,
20130138525,
20130144888,
20130145148,
20130145172,
20130159178,
20130159184,
20130166402,
20130166456,
20130173736,
20130185202,
20130191286,
20130191289,
20130198071,
20130198080,
20130200146,
20130204787,
20130204793,
20130212007,
20130212017,
20130212019,
20130212024,
20130212026,
20130212666,
20130218698,
20130218769,
20130226799,
20130226813,
20130246199,
20130246202,
20130246203,
20130246258,
20130246259,
20130246261,
20130246267,
20130254028,
20130254052,
20130254102,
20130254117,
20130262296,
20130262302,
20130262315,
20130262316,
20130262317,
20130275300,
20130275307,
20130275308,
20130282502,
20130282575,
20130282588,
20130297501,
20130297504,
20130297508,
20130304649,
20130308778,
20130311382,
20130317982,
20130332344,
20130339253,
20130346314,
20140007213,
20140013106,
20140013114,
20140013452,
20140019352,
20140025581,
20140025585,
20140025958,
20140032417,
20140032418,
20140040137,
20140040139,
20140040144,
20140040145,
20140040148,
20140040628,
20140041018,
20140046853,
20140047551,
20140052532,
20140052620,
20140052637,
20140068706,
20140074637,
20140108172,
20140114857,
20140143137,
20140164243,
20140188586,
20140294701,
20140297534,
20140310183,
20140330721,
20140330722,
20140331265,
20140337236,
20140344153,
20140372308,
20150019443,
20150032625,
20150032626,
20150032627,
20150046338,
20150046339,
20150052064,
20150088756,
20150106239,
20150112870,
20150112871,
20150120472,
20150127529,
20150127547,
20150140960,
20150142673,
20150161597,
20150178724,
20150180836,
20150186864,
20150193222,
20150195133,
20150199679,
20150199689,
20150220917,
20150269566,
20150312038,
20150319158,
20150332262,
20150356560,
20160028550,
20160042263,
20160065370,
20160092696,
20160092872,
20160103675,
20160119296,
20160224976,
20170046696,
20170103387,
20170220818,
20170228723,
EP2156397,
RE40444, Dec 29 1998 PayPal, Inc Four-party credit/debit payment protocol
RE43157, Sep 12 2002 Liberty Peak Ventures, LLC System and method for reassociating an account number to another transaction account
WO2001035304,
WO2004042536,
WO2006113834,
WO2009032523,
WO2010078522,
WO2012068078,
WO2012098556,
WO2012142370,
WO2012167941,
WO2013048538,
WO2013056104,
WO2013119914,
WO2013179271,
//
Executed onAssignorAssigneeConveyanceFrameReelDoc
Jan 20 2015Visa International Service Association(assignment on the face of the patent)
Feb 23 2015MCGUIRE, KEITHVisa International Service AssociationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0350970582 pdf
Date Maintenance Fee Events
Mar 23 2022M1551: Payment of Maintenance Fee, 4th Year, Large Entity.


Date Maintenance Schedule
Oct 09 20214 years fee payment window open
Apr 09 20226 months grace period start (w surcharge)
Oct 09 2022patent expiry (for year 4)
Oct 09 20242 years to revive unintentionally abandoned end. (for year 4)
Oct 09 20258 years fee payment window open
Apr 09 20266 months grace period start (w surcharge)
Oct 09 2026patent expiry (for year 8)
Oct 09 20282 years to revive unintentionally abandoned end. (for year 8)
Oct 09 202912 years fee payment window open
Apr 09 20306 months grace period start (w surcharge)
Oct 09 2030patent expiry (for year 12)
Oct 09 20322 years to revive unintentionally abandoned end. (for year 12)